Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 26.592596] ================================================================== [ 26.593834] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 26.594496] Free of addr fff00000c657c000 by task kunit_try_catch/225 [ 26.595093] [ 26.595909] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.597043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.597607] Hardware name: linux,dummy-virt (DT) [ 26.598228] Call trace: [ 26.598627] show_stack+0x20/0x38 (C) [ 26.599292] dump_stack_lvl+0x8c/0xd0 [ 26.599964] print_report+0x118/0x5e0 [ 26.600567] kasan_report_invalid_free+0xb0/0xd8 [ 26.601261] __kasan_mempool_poison_object+0x14c/0x150 [ 26.602026] mempool_free+0x28c/0x328 [ 26.602684] mempool_double_free_helper+0x150/0x2e0 [ 26.603580] mempool_kmalloc_large_double_free+0xb8/0x110 [ 26.604312] kunit_try_run_case+0x14c/0x3d0 [ 26.604968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.605743] kthread+0x24c/0x2d0 [ 26.606294] ret_from_fork+0x10/0x20 [ 26.607063] [ 26.607368] The buggy address belongs to the physical page: [ 26.608029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c [ 26.609030] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.609864] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.610733] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.611730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.612552] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.613460] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.614298] head: 0bfffe0000000002 ffffc1ffc3195f01 ffffffffffffffff 0000000000000000 [ 26.615319] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.616452] page dumped because: kasan: bad access detected [ 26.617128] [ 26.617421] Memory state around the buggy address: [ 26.618074] fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.619100] fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.619829] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.620769] ^ [ 26.621181] fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.621941] fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.622642] ================================================================== [ 26.632154] ================================================================== [ 26.633269] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 26.634147] Free of addr fff00000c657c000 by task kunit_try_catch/227 [ 26.634904] [ 26.635509] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.636904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.637431] Hardware name: linux,dummy-virt (DT) [ 26.638052] Call trace: [ 26.638515] show_stack+0x20/0x38 (C) [ 26.639152] dump_stack_lvl+0x8c/0xd0 [ 26.639869] print_report+0x118/0x5e0 [ 26.640452] kasan_report_invalid_free+0xb0/0xd8 [ 26.641171] __kasan_mempool_poison_pages+0xe0/0xe8 [ 26.641783] mempool_free+0x24c/0x328 [ 26.642200] mempool_double_free_helper+0x150/0x2e0 [ 26.643135] mempool_page_alloc_double_free+0xb4/0x110 [ 26.643781] kunit_try_run_case+0x14c/0x3d0 [ 26.644438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.645102] kthread+0x24c/0x2d0 [ 26.645714] ret_from_fork+0x10/0x20 [ 26.646204] [ 26.646526] The buggy address belongs to the physical page: [ 26.647381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c [ 26.648463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.649278] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.650121] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.650997] page dumped because: kasan: bad access detected [ 26.651565] [ 26.651892] Memory state around the buggy address: [ 26.652463] fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.653659] fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.654437] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.655374] ^ [ 26.655760] fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.657028] fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.657771] ================================================================== [ 26.532676] ================================================================== [ 26.533975] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 26.534664] Free of addr fff00000c1288000 by task kunit_try_catch/223 [ 26.536543] [ 26.536913] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.538048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.538799] Hardware name: linux,dummy-virt (DT) [ 26.539379] Call trace: [ 26.539672] show_stack+0x20/0x38 (C) [ 26.540135] dump_stack_lvl+0x8c/0xd0 [ 26.540535] print_report+0x118/0x5e0 [ 26.541476] kasan_report_invalid_free+0xb0/0xd8 [ 26.542347] check_slab_allocation+0xd4/0x108 [ 26.543174] __kasan_mempool_poison_object+0x78/0x150 [ 26.543992] mempool_free+0x28c/0x328 [ 26.544662] mempool_double_free_helper+0x150/0x2e0 [ 26.545391] mempool_kmalloc_double_free+0xb8/0x110 [ 26.546131] kunit_try_run_case+0x14c/0x3d0 [ 26.546882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.547807] kthread+0x24c/0x2d0 [ 26.548821] ret_from_fork+0x10/0x20 [ 26.549474] [ 26.549938] Allocated by task 223: [ 26.550541] kasan_save_stack+0x3c/0x68 [ 26.551260] kasan_save_track+0x20/0x40 [ 26.552114] kasan_save_alloc_info+0x40/0x58 [ 26.552740] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.553466] remove_element+0x130/0x1f8 [ 26.553965] mempool_alloc_preallocated+0x58/0xc0 [ 26.554670] mempool_double_free_helper+0x94/0x2e0 [ 26.555356] mempool_kmalloc_double_free+0xb8/0x110 [ 26.556518] kunit_try_run_case+0x14c/0x3d0 [ 26.557120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.557784] kthread+0x24c/0x2d0 [ 26.558310] ret_from_fork+0x10/0x20 [ 26.558875] [ 26.559224] Freed by task 223: [ 26.559835] kasan_save_stack+0x3c/0x68 [ 26.560470] kasan_save_track+0x20/0x40 [ 26.561006] kasan_save_free_info+0x4c/0x78 [ 26.561500] __kasan_mempool_poison_object+0xc0/0x150 [ 26.562234] mempool_free+0x28c/0x328 [ 26.563533] mempool_double_free_helper+0x100/0x2e0 [ 26.564136] mempool_kmalloc_double_free+0xb8/0x110 [ 26.564845] kunit_try_run_case+0x14c/0x3d0 [ 26.565486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.566213] kthread+0x24c/0x2d0 [ 26.566781] ret_from_fork+0x10/0x20 [ 26.567604] [ 26.567969] The buggy address belongs to the object at fff00000c1288000 [ 26.567969] which belongs to the cache kmalloc-128 of size 128 [ 26.569268] The buggy address is located 0 bytes inside of [ 26.569268] 128-byte region [fff00000c1288000, fff00000c1288080) [ 26.570579] [ 26.570960] The buggy address belongs to the physical page: [ 26.572315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101288 [ 26.573247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.574059] page_type: f5(slab) [ 26.574653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.575598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.576713] page dumped because: kasan: bad access detected [ 26.577365] [ 26.577743] Memory state around the buggy address: [ 26.578290] fff00000c1287f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.579288] fff00000c1287f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.580397] >fff00000c1288000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.581403] ^ [ 26.582332] fff00000c1288080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.583139] fff00000c1288100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.584293] ==================================================================
[ 26.779110] ================================================================== [ 26.781247] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 26.782313] Free of addr ffff888102960f00 by task kunit_try_catch/242 [ 26.783672] [ 26.783849] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.785972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.786759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.787784] Call Trace: [ 26.787998] <TASK> [ 26.788459] dump_stack_lvl+0x73/0xb0 [ 26.789270] print_report+0xd1/0x640 [ 26.790014] ? __virt_addr_valid+0x1db/0x2d0 [ 26.790412] ? mempool_double_free_helper+0x185/0x370 [ 26.791137] ? kasan_complete_mode_report_info+0x64/0x200 [ 26.792111] ? mempool_double_free_helper+0x185/0x370 [ 26.792797] kasan_report_invalid_free+0xc0/0xf0 [ 26.793624] ? mempool_double_free_helper+0x185/0x370 [ 26.794447] ? mempool_double_free_helper+0x185/0x370 [ 26.794947] ? mempool_double_free_helper+0x185/0x370 [ 26.795652] check_slab_allocation+0x101/0x130 [ 26.796361] __kasan_mempool_poison_object+0x91/0x1d0 [ 26.797080] mempool_free+0x2ec/0x380 [ 26.797590] mempool_double_free_helper+0x185/0x370 [ 26.798204] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.798975] mempool_kmalloc_double_free+0xb1/0x100 [ 26.799970] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 26.800638] ? __switch_to+0x5d9/0xf60 [ 26.801093] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.801807] ? __pfx_mempool_kfree+0x10/0x10 [ 26.802474] ? __pfx_read_tsc+0x10/0x10 [ 26.803007] ? ktime_get_ts64+0x86/0x230 [ 26.803772] kunit_try_run_case+0x1b3/0x490 [ 26.804536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.805154] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.805744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.806480] ? __kthread_parkme+0x82/0x160 [ 26.806858] ? preempt_count_sub+0x50/0x80 [ 26.807241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.807735] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.808762] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.809671] kthread+0x257/0x310 [ 26.810060] ? __pfx_kthread+0x10/0x10 [ 26.810464] ret_from_fork+0x41/0x80 [ 26.811114] ? __pfx_kthread+0x10/0x10 [ 26.811509] ret_from_fork_asm+0x1a/0x30 [ 26.812098] </TASK> [ 26.812973] [ 26.813175] Allocated by task 242: [ 26.813760] kasan_save_stack+0x3d/0x60 [ 26.814262] kasan_save_track+0x18/0x40 [ 26.814720] kasan_save_alloc_info+0x3b/0x50 [ 26.815667] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 26.816894] remove_element+0x11e/0x190 [ 26.817421] mempool_alloc_preallocated+0x4d/0x90 [ 26.818078] mempool_double_free_helper+0x8b/0x370 [ 26.818647] mempool_kmalloc_double_free+0xb1/0x100 [ 26.819062] kunit_try_run_case+0x1b3/0x490 [ 26.820018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.821550] kthread+0x257/0x310 [ 26.821954] ret_from_fork+0x41/0x80 [ 26.822327] ret_from_fork_asm+0x1a/0x30 [ 26.822936] [ 26.823323] Freed by task 242: [ 26.823589] kasan_save_stack+0x3d/0x60 [ 26.824083] kasan_save_track+0x18/0x40 [ 26.824482] kasan_save_free_info+0x3f/0x60 [ 26.825826] __kasan_mempool_poison_object+0x131/0x1d0 [ 26.826698] mempool_free+0x2ec/0x380 [ 26.827342] mempool_double_free_helper+0x10a/0x370 [ 26.828158] mempool_kmalloc_double_free+0xb1/0x100 [ 26.829049] kunit_try_run_case+0x1b3/0x490 [ 26.829604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.830776] kthread+0x257/0x310 [ 26.831471] ret_from_fork+0x41/0x80 [ 26.832052] ret_from_fork_asm+0x1a/0x30 [ 26.832640] [ 26.833026] The buggy address belongs to the object at ffff888102960f00 [ 26.833026] which belongs to the cache kmalloc-128 of size 128 [ 26.835216] The buggy address is located 0 bytes inside of [ 26.835216] 128-byte region [ffff888102960f00, ffff888102960f80) [ 26.836141] [ 26.836582] The buggy address belongs to the physical page: [ 26.837059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102960 [ 26.837989] flags: 0x200000000000000(node=0|zone=2) [ 26.839031] page_type: f5(slab) [ 26.839580] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 26.840235] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 26.841403] page dumped because: kasan: bad access detected [ 26.841841] [ 26.842000] Memory state around the buggy address: [ 26.842706] ffff888102960e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.843977] ffff888102960e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.844384] >ffff888102960f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.845967] ^ [ 26.846540] ffff888102960f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.847269] ffff888102961000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.848278] ================================================================== [ 26.914851] ================================================================== [ 26.916079] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 26.917157] Free of addr ffff888102b40000 by task kunit_try_catch/246 [ 26.917680] [ 26.918058] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.920194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.920950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.922235] Call Trace: [ 26.922679] <TASK> [ 26.923726] dump_stack_lvl+0x73/0xb0 [ 26.924888] print_report+0xd1/0x640 [ 26.925271] ? __virt_addr_valid+0x1db/0x2d0 [ 26.926163] ? mempool_double_free_helper+0x185/0x370 [ 26.927825] ? kasan_addr_to_slab+0x11/0xa0 [ 26.928303] ? mempool_double_free_helper+0x185/0x370 [ 26.929382] kasan_report_invalid_free+0xc0/0xf0 [ 26.930012] ? mempool_double_free_helper+0x185/0x370 [ 26.931329] ? mempool_double_free_helper+0x185/0x370 [ 26.931811] __kasan_mempool_poison_pages+0x115/0x130 [ 26.932224] mempool_free+0x290/0x380 [ 26.932768] mempool_double_free_helper+0x185/0x370 [ 26.933490] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.934049] ? finish_task_switch.isra.0+0x153/0x700 [ 26.934652] mempool_page_alloc_double_free+0xac/0x100 [ 26.935393] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 26.936251] ? __switch_to+0x5d9/0xf60 [ 26.936928] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 26.937870] ? __pfx_mempool_free_pages+0x10/0x10 [ 26.938827] ? __pfx_read_tsc+0x10/0x10 [ 26.939261] ? ktime_get_ts64+0x86/0x230 [ 26.940038] kunit_try_run_case+0x1b3/0x490 [ 26.941064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.942045] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.942695] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.943685] ? __kthread_parkme+0x82/0x160 [ 26.944503] ? preempt_count_sub+0x50/0x80 [ 26.945503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.945796] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.947373] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.948357] kthread+0x257/0x310 [ 26.948741] ? __pfx_kthread+0x10/0x10 [ 26.949525] ret_from_fork+0x41/0x80 [ 26.952426] ? __pfx_kthread+0x10/0x10 [ 26.953252] ret_from_fork_asm+0x1a/0x30 [ 26.953982] </TASK> [ 26.954350] [ 26.954839] The buggy address belongs to the physical page: [ 26.955730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40 [ 26.956867] flags: 0x200000000000000(node=0|zone=2) [ 26.957457] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.958269] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.958935] page dumped because: kasan: bad access detected [ 26.959230] [ 26.959400] Memory state around the buggy address: [ 26.960391] ffff888102b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.961456] ffff888102b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.962184] >ffff888102b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.962836] ^ [ 26.963173] ffff888102b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.963766] ffff888102b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.964258] ================================================================== [ 26.855015] ================================================================== [ 26.856706] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370 [ 26.857413] Free of addr ffff888102b40000 by task kunit_try_catch/244 [ 26.857923] [ 26.858106] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.858970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.859506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.860271] Call Trace: [ 26.860943] <TASK> [ 26.861488] dump_stack_lvl+0x73/0xb0 [ 26.862017] print_report+0xd1/0x640 [ 26.862533] ? __virt_addr_valid+0x1db/0x2d0 [ 26.862996] ? mempool_double_free_helper+0x185/0x370 [ 26.863637] ? kasan_addr_to_slab+0x11/0xa0 [ 26.864032] ? mempool_double_free_helper+0x185/0x370 [ 26.864898] kasan_report_invalid_free+0xc0/0xf0 [ 26.865772] ? mempool_double_free_helper+0x185/0x370 [ 26.866486] ? mempool_double_free_helper+0x185/0x370 [ 26.867066] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 26.867715] mempool_free+0x2ec/0x380 [ 26.868694] mempool_double_free_helper+0x185/0x370 [ 26.869254] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 26.869920] ? finish_task_switch.isra.0+0x153/0x700 [ 26.870438] mempool_kmalloc_large_double_free+0xb1/0x100 [ 26.870892] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 26.872029] ? __switch_to+0x5d9/0xf60 [ 26.872660] ? __pfx_mempool_kmalloc+0x10/0x10 [ 26.873113] ? __pfx_mempool_kfree+0x10/0x10 [ 26.873742] ? __pfx_read_tsc+0x10/0x10 [ 26.874089] ? ktime_get_ts64+0x86/0x230 [ 26.874637] kunit_try_run_case+0x1b3/0x490 [ 26.875113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.876020] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.877168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.878482] ? __kthread_parkme+0x82/0x160 [ 26.879327] ? preempt_count_sub+0x50/0x80 [ 26.880408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.881136] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.881871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.882766] kthread+0x257/0x310 [ 26.883832] ? __pfx_kthread+0x10/0x10 [ 26.884223] ret_from_fork+0x41/0x80 [ 26.884770] ? __pfx_kthread+0x10/0x10 [ 26.885669] ret_from_fork_asm+0x1a/0x30 [ 26.886186] </TASK> [ 26.887077] [ 26.887848] The buggy address belongs to the physical page: [ 26.888500] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40 [ 26.889416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.890582] flags: 0x200000000000040(head|node=0|zone=2) [ 26.891033] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.892750] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.893896] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.894551] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.896043] head: 0200000000000002 ffffea00040ad001 ffffffffffffffff 0000000000000000 [ 26.896625] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.897807] page dumped because: kasan: bad access detected [ 26.898472] [ 26.898740] Memory state around the buggy address: [ 26.899910] ffff888102b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.900445] ffff888102b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.900889] >ffff888102b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.901912] ^ [ 26.902190] ffff888102b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.903347] ffff888102b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.904068] ==================================================================